case_study

Case study

Student’s name

Affiliation

Date

There are various cause of hypothyroidism which include lack of iodine and autoimmune condition Hashimoto’s thyroiditis, an injury in the hypothalamus, an initial treatment of a radioactive, pituitary gland, a previous thyroid surgery, and lack if a functioning thyroid at birth and even use of certain medications. When the TSH test shows it has come back to normal and the symptoms still show hypothyroid, the level of free T4 Should be measured in one’s blood stream. Most hypothyroid patient have high levels of TSH and low levels of T4 which is known as primary hypothyroidism. This takes place because the pituitary gland has realized that the thyroid does not produce enough hormones.

Due to that the pituitary gland releases more TSH in order to motivate the thyroid into a creating hormone (Allahabadia .et.al, 2009). If the thyroid is not functioning well it will not respond to the pituitary signs and this will lead to low levels of free T4 and high levels of TSH. When one has free T4 levels that are low the range will be lower than 5micrograms per deciliter.Bertha had pneumonia which is a lung disease and pleural effusion affect the lungs during inspiration and expiration. Bertha had pneumonia bacteria which comes together with parapneumonic effusion this might have led to pleural effusion (Light, 2007) .A pleural effusion occurs when an abnormal fluid collects in chest within the pleural and visceral areas. Bertha’s rate was reduced because er heart rate had slowed which lead to decreased blood circulation in the heart and other organs. Myxedema coma is an advanced hypothyroid and If Bertha does not get intensive care she is at high risk

References

Allahabadia A., Razvi S., Abraham P., Franklyn . Diagnosis and treatment of primary hypothyroidism. British Medical Journal (International Edition) [serial online]. 2009;338:1090. Available from: Health Module. Accessed February 19, 2010, Document ID: 1731734701.

Light RW. Pleural Diseases Fifth Edition. Philadelphia, PA: Lippincott Williams & Wilkins; 2007.

Refetoff S. Thyroid function tests. In: DeGroot ED. ed. Endocrinology. New York: Grune & Stratton, 1979;1:387–428.

Adjustment of the Project’s Working Timeline and Schedule

To: weim@osint.comSubject: Adjustment of the Project’s Working Timeline and Schedule

Dear Mr. Wei,

I am writing to brief you of the current progress of the project and to also inform you of a regrettable and unprecedented delay in the Deep Learning Model Project. Accordingly, we have adjusted the timeline to fit the new scenario.

The project is facing some difficulties at the moment. The trained YOLO deep learning classification model works with 95% accuracy on the most common fish that were first tested but has only 37% accuracy on rare fish, camouflaged fish, and three species of fish with similar colouring. As a result, detection and classification of these groups is not consistent. Due to the need to provide accurate results, we have had to apply a combination of techniques including generating augmented data for the rare fish specifies and to modify the deep learning model for the camouflaged fish. We are also preparing to label more training examples for the three similar species of fish. As you are well aware, each of the aforementioned techniques has been used before to solve other problems but we will need to adapt them for our data.

Therefore, the current problem is on providing consistent results for the project to be used for purposes of our project. The scope of the project has expanded due to the unforeseen need to conduct more research and to apply more techniques to cover the base of the project. Consequently, the time needed to complete this phase of the project has had to be adjusted. We are not in a position to provide a working deadline or timeframe for the remaining parts of the project, but we will furnish you with this information in the course of the week.

We are very confident that we will solve the delay and come up with solutions toward a reliable technique that can be used during the course of the project. All our attention is focused on the completion of this project, including the provision of accurate data and information for purposes of our cooperation.

Our team expresses much appreciation for your understanding and flexibility as we endeavor to tackle this unforeseen issue. We know that you understand the need for us to provide accurate information in every step of the way.

Thank you. Please feel free to contact me in case you have any questions regarding the time extension, the pending schedule, or the expansion of the scope of the project.

Sincerely,

Enter Name

Cases of news journals or article that do not seem to give complete information has been on the rise in the 21st century.

Cases of news journals or article that do not seem to give complete information has been on the rise in the 21st century. Getting the right and accurate information out there is no longer a big deal as getting a news piece or article that will get more reading and clicks which translates to more money is far much important. The press has often been seen as a corrupt entity just as much as how the government is corrupt. News press accept bribes not a physical way but in a systematic sense. The news should often report the truth as they owe the public however we see that the government and the media are entwined in a circle of mythmaking and manipulation. Certain news articles are often written to propagate certain agendas or to pass a misleading information out there. This essay will look at three news stories that have non truth telling context.

In 2016 during the Presidential campaign, a term Pizzagate theory emerged. This was a fake story that had been created on Hillary Clinton Presidential campaign. According to the story, John Podesra who was Hillary Clinton campaign manager had his email hacked. There were speculations that he among other top Democratic officials ran a human trafficking ring. Although this information was not founded there were several mainstream medias that took up the story. According to them two restaurants Pizzagate and DC, Comet Ping Pong pizzeria were where the meetings were held. This story did quickly spread to all social media platforms and even top officials most from the Republican party were engaging in it. With a lot of engagements, it was getting it quickly did spread although every single accusation was false. This false story caused a lot of damage to the two restaurants and while the news stories were running they were losing profits because were avoiding the place. There was also a shooting as a man walked into Comet Pizzeria with an assault rifle and fired shots because of the non-truth telling news that were being spread.

Mainstream medias have fallen victims of reporting half-baked news that seem to have little lies. Recently Fox news offered an apology on their fake news that was targeting Cal Poly. There was a news headline after they interviewed a conservative student on the plight of conservative that said “CAL POLY PLOTS TO REDUCE WHITE ENROLLMENT” (Sheeler, 2018). This was actually untrue as it was claiming that Cal Poly was using a race-based admission process v which was against Proposition 209 passed by Californian voters in 1996 that prohibited the public universities from using race to increase either the number of Latinos, African American or other underrepresented students. This caused a lot of anger that Fox eventually had to apologize for this mistake. When one got to read the article, the headline might have been misleading but the content gave a little bit of an understanding of what they were saying. With the lie on their headline, they were more likely to get the clicks and more people were likely to read the article as opposed to if they actually used the correct news headline.

CNN in 2017 reported a story that linked Antony Scaramucci to a Russian investment firm. The story reported that the Congress was investigating a Russian investment fund that had ties with Trump officials. According to the reporter, the information came from an anonymous single source. The story was not really wrong but it did lack enough facts for it to be published. The article reported that a meeting had taken place between Antony Scaramucci and Kirill Dmitriev. This news led to resignation of three CNN journalist who were part of an investigative team that had been created in CNN to look into investigative stories that will be run by the news network. As news network it is important to get the facts right on a story before publishing especially if it involves hefty matters that are likely to get the attention of many. Many news sources know that any link between Trump and Russia is likely to get a huge reading thus there was need to get all the facts right before publishing the story. The fact that a reputable news network would publish a news article based on a single anonymous source without proof is quite saddening and goes against the ethics of journalism.

Plato and Aristotle have often been seen as post-truth philosophers. Plato in terms of truth and governance he talks of how to set up a just society and one way of setting it up is having a divided view on what one should let people know. Plato in his argument believes that the kind of knowledge a society needs is the one that is necessary for their lives. When Martha Stewart was linked to the crime of Insider trading at Imclone. IN2001, she sold her shares of the company and just two days later the stock values dropped. By selling her shares before the value dropped she had saved $45,673. However, she was not the only one that had benefitted as the CEO had also sold his shares thus they were faced with the case of illegal insider trading. From Stewart’s case, prosecutors worked hard to try and prove that Steward had sold her shares from nonpublic information.

Administering Competency Screening Tests on a Minor

Administering Competency Screening Tests

Name

Institution Affiliation

Date

Administering Competency Screening Tests on a Minor

Abstract

Balancing between Competency Screening Test (CST) expectations and demands of a given situations is normally an uphill task for CST administrators. A CST tool administers tests on juvenile or mentally challenged individuals. The process is tedious since there are several situation of communication breakdown, and this endangers the processes. For this reason, the administering official should displays proper and higher degree of professionalism by using of tests or face-to-face communication with the juvenile. This analysis will appoint Dr. Roberts defense of a 17-year-old individual who has been accused of sexual assault and battery. The juvenile is a linguistically challenged immigrant from Chile. The individual can only communicate Mapudungun and Spanish; however, he can speak and communicate rudimentary English, and this is not positive to the court. The commencing research will prove that Dr. Robert should apply a professional approach to determine the case’s course. The report will further clarify it is appropriate to encourage CST as compared to direct judicial test to minors who are linguistically challenged.

How should Dr. Roberts proceed with the evaluation?

Determining the eligibility of the case is normally an uphill task if the defendant is linguistically challenged. However, this does not deter clinicians from providing a valid assessment of whether the case is in a position to defend himself through language. The male defendant in Dr. Robert case is rather complicated. Accordingly, the young male defendant is not only linguistically challenged but also has a lower I.Q and is paranoid of ideas. Dr. Robert is expected by the judiciary to provide appropriate assessment. For this reason, the evaluation should ascertain judiciary expectations that the defendant is in a position to comply with the appropriate judicial process.

Since Dr. Robert is authorized by the court to conduct an evaluation, it will only be necessary to have the paperwork intact. Dr. Robert should clarify whether the evaluation is appropriately sought and assess possibility of psycho-legal questions is also at hand. Preliminary information seeks to clarify issues that elicit CST concern. This reflects the subject’s background information. The young man can communicate using rudimentary English. Dr. Robert should be able to understand this English when assessing the young man.

Secondly, Dr. Robert should specify the appropriate time, which should be applied during the evaluation process. Time specification reduces redundancy or false information development. For the legal assessment, Dr. Robert should alert the defense counsel to determine how the attorney plans to present the minor. In addition, Dr. Robert should assess whether the attorney understands the defendant situation and whether it is possible to provide reasons for the CST concerns. Thirdly, Dr. Robert should present the situation the minor parents and caregivers (Jackson, Rogers and Sewell, 2005, pp. 201).

Data overview and evaluation is an essential process that should be pursued and demonstrated with proper connection. Empirical demonstration seeks to examine the youth’s behavioral, social, cognitive, and emotional situation. That is, whether the juvenile conducted the act at his right mental status. Dr. Robert should necessitate direct question based on observation, mental status question, interviewing, psychological testing and symptom interviewing. Dr. Robert should adopt the principle of reliability that is, credibility and dependability.

What, if any, testing should be conducted?

As stated, Data overview and evaluation will seek examine test, which will outline possible results. Tests will be necessary to reflect the juvenile situation. Dr. Robert may think it prudent to use a Competency Screening Test (CST) tool. The test will initialize standardized and scoring tools that are presented on a scale of 0-2 with two meant to reflect a higher degree of sentence completion showing a higher degree of legal comprehension and 0 presenting a low level. Test administration time should be over 25 minutes.

Dr. Robert will have to examine the test results presented during the interview. If the defendant scores below 20, this will request for a comprehensive evaluation. Twenty is according to reliable standards established for the tests. Errors are part of the test results, and they happen to indicate false positives; for example, labeling the minor as incompetent whereas he is competent. Dr. Robert should therefore specify room error even though this provision is controlled. False positive rate should sufficiently demonstrate lower instrumental competence, and these will encourage Dr. Robert to initiate a more decisive evaluation. Testing tool will further seek to clarify a false result that is a percentage, which ranges from 14.3% to 28.6% and is maintained and controlled at that point.

Should he use an individual who speaks Spanish to assist with the evaluation?

Using an individual who speaks French is an ideal approach, however for clinical competence, and this not prove a reliable loom. Rosner (2006, pp. 218) argues that translators are very essential at the judicial court level since the magistrate or the clerk may fail to understand the defendant language. However, in a clinical test, dealing with the juvenile directly is essential since this enables communication. Additionally, Dr. Robert test seek to clarify whether the Juvenile is capable of presenting himself in court of law. There are several problems associated with involving a translator at the clinical level. Most of these problems cannot be extinguished by mere counseling, and it is up to practitioners like Dr. Robert to go the last mile.

It is hard to get a competent translator and according to the extract, and the county does not have finances to hire for a translator neither does Dr. Robert. Secondly, translators utilizing a language fluently are hard to get, and the defendant rudimentary English might be much better. A non-professional translator will naturally pose as competent, and this seeks to sabotage the development of the process.

Thirdly, a mental health professional is likely to exit effectual qualities conveyed in a statement, and this are transported directly as opposed to being experienced directly. Quality and accuracy is the key in the clinical health experiences. Further to this, respond patterns might change valiantly. Emotional issues for instance, visual response, remorse and expression may not be experienced yet this communicates much better than the verbal communication based on the nature of the case. Additionally, a translator might be from the Juvenile Spanish background. This is dangerous since the translator might use his fairer better I.Q to alter various sections of the information with intent to help the juvenile.

Moreover, having a translator on board might deter the quality of the case. Assuming the only available translator is feminine; the Juvenile might feel withdrawn from sharing vital information with the translator. Alternatively, the translator might be withdrawn by the case and might present deceitful information with intent to conduct personal judgment. This is true when self-disclosure of an examiner seeks to present evaluations, and that occur in emotionally intense situation. Rosner (2006, pp. 218) argues that issues related to shame and face-savings play a critical role of everyday situation. Dr. Roberts might inquire factors, which create shaming situation, and the examiner fails to get important information regarding the situation. Hence, the quality of information is a serious stake when it comes to translator.

Firstly, it is a prerequisite that the test construct should be observable by the Dr. Roberts and the juvenile in constructing a conceptual framework. This is a measure of agreement between and concept and where it is derived from. For the content of the interview, it is necessary to create a criterion validity, which has different subscales, and all should be convergent. The goal is to determine the degree of detail that should be dealt with at each specific test. Additionally, Dr. Roberts should apply predictive validity evidence to examine the criterion of the performance assessment instrument. Certification screens identify the extent at which individuals are excluded on the pass test results.

Consequential validity is a central interpretation of test scores, and this appraises the social impact of the examination to the juvenile. A close example of these questions is how the juvenile could have acted in normal life situation. Social impact expresses the degree of persistence and the competencies measured in the assessment over a significant lapse of time during the interview. As part of the ethical principles, Dr. Robert should ensure that the amount time he spends on a juvenile should be proportionate on the nature of I.Q.

What are the ethical issues faced by Dr. Roberts?

Dr. Roberts might fail serious ethical issues hurting standards and governing the relationship between him and the juvenile, him and the judiciary and him and the society. Other issues include secret remedies and exclusive methods of location and appearance and presentation. While most of these requirements are primarily met, it is good to note that the there are other professionals standards that Dr. Roberts should maintain, and this are responsive directly based on the nature of the case.

CST faces critical ethical challenges as it enters the twenty-first century. Struggles seek to meet mission of a changing CST system from one, which is not investigative based to that which understanding based. One serious ethical issue is freedom versus control. The juvenile feels that he want to make some choices yet this constrains Dr. Robert, who is supposed to handle the juvenile as convict. Secondly, another issue involved empirical knowledge versus personal belief. The juvenile might begin feeling nervous and needs a responsive restoration of his normal life, which hinders the development of the case. Thirdly, Dr. Robert also faces significant effects of differences between telling the truth. Dr. Robert might attempt to hold some information from the authority since this might sabotage the development of the case at that particular time. Finally, distribution of resources remains a significant problem towards the development of the case. Some of Dr. Robert C.S.T tools might be absence and this endangers the overall professional development of the situation

How should he resolve these ethical dilemmas?

According to the above ethical possible ethical issues, it is notable that much should be done with intent to protect Dr. Robert professionalism. The chief problems of freedom and empirical knowledge should be handled professionalism by making the juvenile understand the fundamentality of the process. Secondly, issues related to deceit should not be Dr. Robert concern. At all stages, Dr Robert should control the juvenile and assume full responsibility of the how the interview enfolds (Hunter, 2007, pp. 241).

In addition, Dr. Robert should ensure that ethical principles required incompetency are not eroded either physical or mental maturation. Changing attitudes, physical maturation and constraints should not be allowed to hijack the process of evaluation. Validation fosters proper ethical principles; a close example is the face-to-face evaluation. Dr. Robert should face a test juvenile at all time on the eyes but with a charming and professional manner. Additionally, Dr. Robert should organize interviews based on protocol of flow and issues should be not overriding each other. Interviews should be based on APA principles and should focus on getting information in a much friendlier professional way and not hurting the juvenile. Finally, documentation of each process is necessarily as far as ethical issues is concerned.

References

Hunter, D. (2007). Proportional ethical review and the identification of ethical issues. Journal of

Medical Ethics, 33(4), 241-245.

Jackson, R. L., Rogers, R., & Sewell, K. W. (2005). Forensic Applications of the Miller Forensic

Assessment of Symptoms Test (MFAST): Screening for Feigned Disorders in Competency to Stand Trial Evaluations.. Law and Human Behavior, 29(2), 199-210.

Rosner, F. (2006). Medical Research in Children: Ethical Issues. Cancer Investigation, 24(2),

218-220.

Morphemes are the smallest units that hold meaning in language or an element of a word such as –ing in walking.

Morphemes

Morphemes are the smallest units that hold meaning in language or an element of a word such as –ing in walking. They can not be divided further into any small parts that have meaning. Phonemes on the other hand are the smallest units of sound which are found in a language. These are small phonetic units found in a particular language that have the capability of completely changing the entire meaning of a particular word such as b in bat and c in cat in English. In English the word cat can not be broken down into small ideas that are based on the word. This means that “cat” is completely a sound of its own. On the other hand each and every letter in the word ”cat” corresponds to a particular sound which if put separately they can not be complete with each other. In English there are various cases where more than a single phoneme is in correspondence with a single morpheme. For example telephone contains two morphemes which are tele and phone and within the same words there are other several phonemes which are t, e, l, e, f, o, and n.

This paper will therefore identify some of the morphemes and phonemes which are found within some phrases.

Morphemes

Morphemes can be classified into two broad categories they are either free or bound. These two morpheme categories are mutually exclusive to each other. This therefore means that a particular morpheme can only belong to a particular category. So/me gentle /men dined at an economical restaurant. They found the service to be un /acceptable and wish/ed to ex/press their un/happiness to the man/age/ment. The manager was un/available, so they brought the left/overs home to their dog who resided in a dog/house in the back/yard. These phrases contain various morphemes, some of then are free while others are bound. These morphemes are so and me in some, gentle and man in gentleman, un and acceptable in unacceptable, wish and ed in wished, ex and press in express, un and happiness in unhappiness, man, age and ment in management, un and available in unavailable, left and overs in left overs, back and yard in backyard and lastly dog and house in dog house. Among the free morphemes are gentle,men,acceptable,wish,available,press,man,age,left,overs,dog,house,back, and yard. They are classified as free morphemes because each of the morphemes can exist and function as complete words with specific meanings independently.

The Bound morphemes on the other hand are so, me, ed, un, ment, ex .these morphemes are classified as bound since they form part of words and act as conjunctions with roots or even other free morphemes or other bound morphemes. For instance un is only found together with other morphemes so that it forms a word with meaning. Most of these morphemes are prefixes like ex, un and suffixes like –ed,-ment while others are cranberry morphemes which are neither prefixes nor suffixes such as so and me.

Phonemes

There are various phonemes found in English. There are close to forty phonemes found in English. The phrase “There was an old woman who swallowed a fly. I don’t know why she swallowed a fly. Perhaps she’ll die” contains various phonemes This can be represented in the IPA format as follows

/ðɛər/-there,/ wʌz/-was, /æn/-an, /oʊld/-old, /wʊmən/-woman, /swɒloʊ/-swallow, /flaɪ/-fly, /doʊnt/- don’t, /noʊ/-know, ,/ waɪ/-why, /ʃi/-she, /pərˈhæps/-perhaps, /ʃil/-she’ll, /daɪ/-die. Therefore all these words have particular phonemes in them which are represented.

Addressing the Increase in the number and Types of Computer Crimes

Addressing the Increase in the number and Types of Computer Crimes

THESIS: Laws must be passed to address the increase in the number and types of computer crimes.

Over the last twenty years, a technological revolution has occurred as computers are now an essential element of today’s society. Large computers are used to track reservations for the airline industry, process billions of dollars for banks, manufacture products for industry, and conduct major transactions for businesses because more and more people now have computers at home and at the office.

People commit computer crimes because of society’s declining ethical standards more than any economic need. According to experts, gender is the only bias. The profile of today’s non-professional thieves crosses all races, age groups and economic strata. Computer criminals tend to be relatively honest and in a position of trust: few would do anything to harm another human, and most do not consider their crime to be truly dishonest. Most are males: women have tended to be accomplices, though of late they are becoming more aggressive. Computer Criminals tend to usually be “between the ages of 14-30, they are usually bright, eager, highly motivated, adventuresome, and willing to accept technical challenges.”(Shannon, 16:2)

“It is tempting to liken computer criminals to other criminals, ascribing characteristics somehow different from ‘normal’ individuals, but that is not the case.”(Sharp, 18:3) It is believed that the computer criminal “often marches to the same drum as the potential victim but follows and unanticipated path.”(Blumenthal, 1:2) There is no actual profile of a computer criminal because they range from young teens to elders, from black to white, from short to tall.

Definitions of computer crime has changed over the years as the users and misusers of computers have expanded into new areas. “When computers were first introduced into businesses, computer crime was defined simply as a form of white-collar crime committed inside a computer system.”(2600: Summer 92,p.13)

Some new terms have been added to the computer criminal vocabulary. “Trojan Horse is a hidden code put into a computer program. Logic bombs are implanted so that the perpetrator doesn’t have to physically present himself or herself.” (Phrack 12,p.43) Another form of a hidden code is “salamis.” It came from the big salami loaves sold in delis years ago. Often people would take small portions of bites that were taken out of them and then they were secretly returned to the shelves in the hopes that no one would notice them missing.(Phrack 12,p.44)

Congress has been reacting to the outbreak of computer crimes. “The U.S. House of Judiciary Committee approved a bipartisan computer crime bill that was expanded to make it a federal crime to hack into credit and other data bases protected by federal privacy statutes.”(Markoff, B

13:1) This bill is generally creating several categories of federal misdemeanor felonies for unauthorized access to computers to obtain money, goods or services or classified information.

This also applies to computers used by the federal government or used in interstate of foreign commerce which would cover any system accessed by interstate telecommunication systems.

“Computer crime often requires more sophistications than people realize it.”(Sullivan, 40:4) Many U.S. businesses have ended up in bankruptcy court unaware that they have been victimized by disgruntled employees. American businesses wishes that the computer security nightmare would vanish like a fairy tale. Information processing has grown into a gigantic industry. “It accounted for $33 billion in services in 1983, and in 1988 it was accounted to be $88 billion.” (Blumenthal, B 1:2)

All this information is vulnerable to greedy employees, nosy-teenagers and general carelessness, yet no one knows whether the sea of computer crimes is “only as big as the Gulf of Mexico or as huge as the North Atlantic.” (Blumenthal,B 1:2) Vulnerability is likely to increase in the future. And by the turn of the century, “nearly all of the software to run computers will be bought from vendors rather than developed in houses, standardized software will make theft easier.” (Carley, A 1:1)

A two-year secret service investigation code-named Operation Sun-Devil, targeted companies all over the United States and led to numerous seizures. Critics of Operation Sun-Devil claim that the Secret Service and the FBI, which have almost a similar operation, have conducted unreasonable search and seizures, they disrupted the lives and livelihoods of many people, and generally conducted themselves in an unconstitutional manner. “My whole life changed because of that operation. They charged me and I had to take them to court. I have to thank 2600 and Emmanuel Goldstein for publishing my story. I owe a lot to the fellow hackers and fellow hackers and the Electronic Frontier Foundation for coming up with the blunt of the legal fees so we could fight for our rights.” (Interview with Steve Jackson, fellow hacker, who was charged in operation Sun Devil) The case of Steve Jackson Games vs. Secret Service has yet to come to a verdict yet but should very soon. The secret service seized all of Steve Jackson’s computer materials which he made a living on. They charged that he made games that published information on how to commit computer crimes. He was being charged with running a underground hack system. “I told them it was only a game and that I was angry and that was the way that I tell a story. I never thought Hacker [Steve Jackson’s game] would cause such a problem. My biggest problem was that they seized the BBS (Bulletin Board System) and because of that I had to make drastic cuts, so we laid of eight people out of 18. If the Secret Service had just come with a subpoena we could have showed or copied every file in the building for them.”(Steve Jackson Interview)

Computer professionals are grappling not only with issues of free speech and civil liberties, but also with how to educate the public and the media to the difference between on-line computer experimenters. They also point out that, while the computer networks and the results are a new kind of crime, they are protected by the same laws and freedom of any real world domain.

“A 14-year old boy connects his home computer to a television line, and taps into the computer at his neighborhood bank and regularly transfers money into his personnel account.”(2600: Spring 93, p.19) On paper and on screens a popular new mythology is growing quickly in which computer criminals are the ‘Butch Cassidys’ of the electronic age. “These true tales of computer capers are far from being futuristic fantasies.”(2600: Spring 93:p.19) They are inspired by scores of real life cases. Computer crimes are not just crimes against the computer, but it is also against the theft of money, information, software, benefits and welfare and many more.

“With the average damage from a computer crime amounting to about $.5 million, sophisticated computer crimes can rock the industry.”(Phrack 25,p.6) Computer crimes can take on many forms. Swindling or stealing of money is one of the most common computer crime. An example of this kind of crime is the Well Fargo Bank that discovered an employee was using the banks computer to embezzle $21.3 million, it is the largest U.S. electronic bank fraud on record. (Phrack 23,p.46)

Credit Card scams are also a type of computer crime. This is one that fears many people and for good reasons. A fellow computer hacker that goes by the handle of Raven is someone who uses his computer to access credit data bases. In a talk that I had with him he tried to explain what he did and how he did it. He is a very intelligent person because he gained illegal access to a credit data base and obtained the credit history of local residents. He then allegedly uses the resident’s names and credit information to apply for 24 Mastercards and Visa cards. He used the cards to issue himself at least 40,000 in cash from a number of automatic teller machines. He was caught once but was only withdrawing $200 and in was a minor larceny and they couldn’t prove that he was the one who did the other ones so he was put on probation. “I was 17 and I needed money and the people in the underground taught me many things. I would not go back and not do what I did but I would try not to get caught next time. I am the leader of HTH (High Tech Hoods) and we are currently devising other ways to make money. If it weren’t for my computer my life would be nothing like it is today.”(Interview w/Raven)

“Finally, one of the thefts involving the computer is the theft of computer time. Most of us don’t realize this as a crime, but the congress consider this as a crime.”(Ball,V85) Everyday people are urged to use the computer but sometimes the use becomes excessive or improper or both. For example, at most colleges’ computer time is thought of as free-good students and faculty often computerizes mailing lists for their churches or fraternity organizations which might be written off as good public relations. But, use of the computers for private consulting projects without payment of the university is clearly improper.

In business it is the similar. Management often looks the other way when employees play computer games or generate a Snoopy calendar. But, if this becomes excessive the employees is stealing work time. And computers can only process only so many tasks at once. Although considered less severe than other computer crimes such activities can represent a major business loss.

“While most attention is currently being given to the criminal aspects of computer abuses, it is likely that civil action will have an equally important effect on long term security problems.”(Alexander, V119) The issue of computer crimes draw attention to the civil or liability aspects in computing environments. In the future there may tend to be more individual and class actionsuits.

CONCLUSION

Computer crimes are fast and growing because the evolution of technology is fast, but the evolution of law is slow. While a variety of states have passed legislation relating to computer crime, the situation is a national problem that requires a national solution. Controls can be instituted within industries to prevent such crimes. Protection measures such as hardware identification, access controls software and disconnecting critical bank applications should be devised.

However, computers don’t commit crimes; people do. The perpetrator’s best advantage is ignorance on the part of those protecting the system. Proper internal controls reduce the opportunity for fraud.

BIBLIOGRAPHY

Alexander, Charles, “Crackdown on Computer Capers,” Time, Feb. 8, 1982, V119.

Ball, Leslie D., “Computer Crime,” Technology Review, April 1982, V85.

Blumenthal,R. “Going Undercover in the Computer Underworld”. New York Times, Jan. 26,

1993, B, 1:2.

Carley, W. “As Computers Flip, People Lose Grip in Saga of Sabatoge at Printing Firm”. Wall

Street Journal, Aug. 27, 1992, A, 1:1.

Carley, W. “In-House Hackers: Rigging Computers for Fraud or Malice Is Often an Inside Job”.

Wall Street Journal, Aug 27, 1992, A, 7:5.

Markoff, J. “Hackers Indicted on Spy Charges”. New York Times, Dec. 8, 1992, B, 13:1.

Finn, Nancy and Peter, “Don’t Rely on the Law to Stop Computer Crime,” Computer World,

Dec. 19, 1984, V18.

Phrack Magazine issues 1-46. Compiled by Knight Lightning and Phiber Optik.

Shannon, L R. “THe Happy Hacker”. New York Times, Mar. 21, 1993, 7, 16:2.

Sharp, B. “The Hacker Crackdown”. New York Times, Dec. 20, 1992, 7, 18:3.

Sullivan, D. “U.S. Charges Young Hackers”. New York Times, Nov. 15, 1992, 1, 40:4. 2600: The Hacker Quarterly. Issues summer 92-Spring 93. Compiled by Emmanuel G

Cases where the president has taken the U.S. troops without congressional authorization (2)

Cases where the president has taken the U.S. troops without congressional authorizationName:

Course:

Instructor

Date

Cases where the president has taken the U.S. troops without congressional authorizationUnder the constitution, the president has the power to veto legislations, command the armed forces, convene and adjourn congress, ask for the opinions on cabinet which should be written, grant reprieves and pardons, and receive and dismiss ambassadors. However, in the second paragraph of Article II, Section 2, the constitution provides that the President shall have Power, by and with the Advice and Consent of the Senate to make Treaties, provided two thirds of the Senators present concurs with the negotiations of the treaty in question CITATION Cur14 l 2057 (Bradley & Goldsmith, 2014). Furthermore, the president shall nominate, and by and with the advice and consent of the Senate, he shall appoint ambassadors, other public ministers and consuls, judges of the Supreme Court, and all other officers of the United States, whose appointments are not included in the mentioned categories above, and which shall be recognized by law. The president basically depends on the senate in making major decisions such as legislations. CITATION Art l 1033 (Article II , n.d.) The president’s power to take the U.S. forces into situations of hostility is limited under the constitution CITATION Cur14 l 2057 (Bradley & Goldsmith, 2014); however, since the founding of the republic, successive presidents have used military force without congressional authorization over two hundred times. This paper will focus on the cases in which the president has taken the U.S. troops into a foreign military situation without congressional Authorization and the legality of the president’s actions for each case presented.

Firstly, is the quasi war between the United States of America and France between 1798 and 1800. John Adams was the president during this war which is viewed to have helped shape the American foreign policy. The American and the French government conflicted over the signing of a supposed peace establishing treaty with England. According to the French, this treaty would violate the 1778 Treaty of Alliance made with the Americans during the American Revolution. Amidst the mayhem, the American government also failed to make debt payments to the French on the basis that the current government was not the government that had signed the treaty. Following this, the French seized Americas merchant ships and upon intervention by the U.S. government the French made so much demands that America could not meet. The U.S. Navy went into war to protect America which was considered to be under attack. The president in this case was obliged to make a decision that favored America. The president’s actions were in line with the best interests of the nation which is legal. CITATION Kat17 l 1033 (Eschner, 2017)Secondly is the Utah Expedition between 1857 and 1858 which was basically an armed confrontation between the United States armed forces and the Mormon settlers in the Utah territory. This confrontation occurred during the time of President James Buchanan who attempted to use force with the Mormons in the Utah territory and ended up stirring a rebellion. American government was particular against the polygamy nature of the Mormons and considered it un-American like. Troops were sent in to install the typical American government and establish law and order. The president’s action was aimed at uphold law and order throughout its jurisdictions and the president was just doing his job which is substantially legal because that is what a ruler is expected to do. CITATION Bla18 l 1033 (Stilwell, 2018)Thirdly are the Indian wars which basically broke out because Indians acquired Christianity and civilization and thus became a threat to the Native Americans. The war was based on racism and religious backgrounds that disguised Indians as barbarians and child killers in the eyes of the Native Americans. The Indians on the other viewed George Washington as a town wrecker because the attack had been through his orders. The last war between the Indians and the American government happened in 1812 under the leadership of Andrew Jackson. In the Indian wars, the president had mobilized the troops to fight for the rights of the Native Americans which were then considered the right thing to do. A people of a different race could not have possible been allowed to take away what belonged to the Native Americans. Legally, the president is obliged to protect the citizens from any kind of invasion within his jurisdiction. CITATION And09 l 1033 (Gardner, 2009)The other war is patriotic war of 1837 with Canada. The patriots who consisted of the Irish and United States citizens in the upper part of Canada and the United States were determined to detach the peninsula lying between the Michigan frontier and the Niagara frontier in Canada and append it to the United States. The patriots marched to make their demands which led to a plot to capture of the United States Arsenal at Dearborn and seizure of its arms. To contain this situation, the Michigan Militia was assigned to watch over Arsenal. More defenses were expended later since the frontier troubles increased. The president in this case acted to fulfill the law of maintaining order within its territories which is a legal thing to do since the patriots were cause unrest and even attacked a militia base in Michigan. CITATION The l 1033 (ThePatriot War, n.d.)Lastly, the naval skirmishes in Sumatra in the 1830s; was about the American expeditions launched against pirates in Indonesia. The American traders who had established their trading links throughout the Far East faced threats which led to the making agreements with the local leaders. This happened during the time of Andrew Jackson and he was so upset upon hearing this news. In reaction, he sent out troops to ensure the American traders were safe during their business operations and this led to the first expedition. The president acted in order to protect its citizens which is utterly the right thing every ruler would do and also legal. CITATION Ant16 l 1033 (Vanner, 2016)In summary, as much as the president acted without authorization from the congress, his actions were utterly for the best to safeguard the interests of the United States. By expending the troops to war, the foreign policy was enhanced particularly in the case of the war with the French.

References

BIBLIOGRAPHY Akkad, O. E. (2017). American War. ‎Alfred A. Knopf.

Article II . (n.d.). Retrieved from Ineractive Constitution : https://constitutioncenter.org/interactive-constitution/articles/article-ii

Bradley, C. A., & Goldsmith, J. L. (2014). Foreign relations law : cases and materials. New York : Wolters Kluwer Law & Business.

Eschner, K. (2017, July 7). This Unremembered US-France ‘Quasi War’ Shaped Early America’s Foreign Relations. Retrieved from Smithsonian.com: https://www.smithsonianmag.com/smart-news/unremembered-us-france-quasi-war-shaped-early-americas-foreign-relations-180963862/

Gardner, A. G. (2009). The Indian War. Colonial Williamsberg.

Last Name, F. M. (Year). Article Title. Journal Title, Pages From – To.

Last Name, F. M. (Year). Book Title. City Name: Publisher Name.

Stilwell, B. (2018, September 19). That time Mormons accidentally went to war with the US Army . Retrieved from We Are the Mighty: https://www.wearethemighty.com/history/utah-mormon-war-with-army

ThePatriot War. (n.d.). Retrieved from Michigan Department of Military and Veterans Affairs: https://www.michigan.gov/dmva/0,4569,7-126-2360_3003_3009-16956–,00.html

Vanner, A. (2016, January 26). The US Navy’s Sumatran Expeditions 1832 & 1838 . Retrieved from Dawlish Chronicles: http://dawlishchronicles.blogspot.com/2016/01/the-us-navys-sumatran-expeditions-1832.html

Case Study

Case Study:

Southwestern University: F The recent success of Southwestern University’s football program is causing SWU’s president, Joel Wisner, more problems than he faced during the team’s losing era in the early 1990s. For one thing, increasing game-day attendance is squeezing the town of Stephenville, Texas and the campus. Complaints are arising over parking, seating, concession prices, and even a shortage of programs at some games. Dr. Wisner, once again, turns to his stadium manager, Hank Maddux. This time, he needs a guaranteed revenue stream to help fuel the stadium expansion. One source of income could easily be the high-profit game programs. Selling for $6 each, programs are a tricky business. Under substantial pressure from Wisner, Maddux knows he has to ensure that costs are held to a minimum and contribution to the new expansion maximized. As a result, Maddux wants the programs for each game to be purchased economically. His inquiries have yielded two options. A local Stephenville printer, Sam Taylor of Quality Printing, has offered the following discount schedule for the programs and game inserts: Programs Weekly Game Detail Inserts 10,000 to 30,000 $2.00 each 10,000 to 30,000 $1.00 30,000 to 60,000 $1.90 each 30,000 to 60,000 $0.95 60,000 to 250,000 $1.80 each 60,000 to 250,000 $0.90 250,000 and up $1.50 each 250,000 and up $0.85 As a second option, however, First Printing, owned by Michael Shader, an S.W.U. alumnus in Ft. Worth, will do the job for 10% less as a favor to help the athletic department. This option will mean sending a truck to Ft. Worth to pick up each order. Maddux estimates that the cost of each trip to Ft. Worth will be $250. Maddux’s other major problem is he is never sure what the demand for programs will be. Sales vary from opponent to opponent and how well the team is doing that year. However, he does know that running out is a very bad idea. This football team is not only expected to make money for SWU, but it is also entertainment. This means programs for all who want them. With the new facility, attendance could be 60,000 for each of the five home games. And two of every three people buy a program. In addition to the programs, Maddux must purchase the inserts for each game. The inserts have information about the opposing team, photos of the expected starters, and recent game statistics. The purchasing issue is the same for inserts, except inserts will be purchased separately for each game and are a total loss after the game. The carrying cost, because inserts are to be delivered just as they are needed, should be nominal; he estimates 5%. The other costs and the same discount schedule apply, but the inserts only cost half as much because they are much smaller. First Printing will give the same 10% discount on the inserts. Givens: Annual demand is 300,000 (60,000 per game times 5 games) Set-up cost for programs is $1,000.00 Holding cost is 40%

DISCUSSION QUESTIONS 1. With whom should Maddux place the order for the programs, and how many should he order each time? 2. With whom should Maddux place the order for the inserts, and how many should he order each time? 3. What is Maddux’s total cost for programs with inserts for the season? 4. What other program management opportunities might Maddux pursue?

Solution:

1. With whom should Maddux place the order for the programs and how many should he order each time?

Answer:

D = 60000 * 5 * 2/3= 200000

H = 0.5 * unit price

S quality printing = 100

S first printing = 100 + .9*(200) = 280

For quality printing

Q = √2DS / IP

Q1 = √2(200000)(100) / 0.5*5 = 4000

Q 2 = √2(200000)(100) / 0.5*1.80 = 6667

Q3 = √2(200000)(100) / 0.5*1.70 = 6860

Q4 = √2(200000)(100) / 0.5*1.60 = 7071

Q4 = √2(200000)(100) / 0.5*1.40 = 7559

Q1 = 6928

Q2 = 11547

Q3 = 30000

Q4 = 60000

Q5 = 250000

Annual Product cost = Demand * unit price

Annual order cost = Demand* setup cost/order quantity

Annual holding cost = Order quantity * holding cost / 2

Number Unit Price Order quantity Annual Product cost Annual order cost Annual holding cost Total

1 5.00 4000 1000000 5000 5000 5000

2 1.80 10000 360000 2000 4500 366500

3 1.70 30000 340000 666.67 12750 353416.67

4 1.60 60000 320000 333.33 24000 344333.33

5 1.40 250000 280000 80 875000 367580

Order quantity of 60000 will minimize total cost to 344333.33

For first printing, Q = √2(200000)(280) / 0.5*5 = 6693

Total cost = Setup cost + holding cost + product cost

= 200000/6693 * 280 + 6693 / 2 * (0.5*5.00) + 6693*5

= 50198.20

So the order for the programs should be placed at quality printing as ordering quantity of 60000 each time

2. With whom should Maddux place the order for the inserts and how many should he order each time?

D = 60000

H = 0.5 * unit price

S quality printing = .5*100 = 50

S first printing = 0.5(100 + .9(200)) = 140

For quality printing

Q = √2DS / IP

Q1 = √2(60000)(50) / 0.5*2.5 = 12649

Q 2 = √2(60000)(50) / 0.5*.90 = 21082

Q3 = √2(60000)(500) / 0.5*.85 = 21693

Q4 = √2(60000)(50) / 0.5*.80 = 22361

Q4 = √2(60000)(50) / 0.5*.70 = 23905

Q1 = 6928

Q2 = 11547

Q3 = 30000

Q4 = 60000

Q5 = 250000

Annual Product cost = Demand * unit price

Annual order cost = Demand* setup cost/order quantity

Annual holding cost = Order quantity * holding cost / 2

Number Unit Price Order quantity Annual Product cost Annual order cost Annual holding cost Total

1 2.50 6928 150000 433.03 433 150866.03

2 0.90 11547 54000 259.81 259.81 54519.62

3 0.85 30000 51000 100 637.50 51737.50

4 0.80 60000 48000 50.00 1200.00 49250

5 0.70 250000 42000 12.00 4357 46387

Order quantity of 250000 will minimize total cost to 46387

For first printing, Q = √2(60000)(140) / 0.5*2.50 = 11593

Total cost = Setup cost + holding cost + product cost

= 60000/11593 * 140 + 11593 / 2 * (.05*2.50) + (11593 * 2.50)

= 30431.64

3.What is Maddux’s total cost for programs with inserts for the season?

The total cost for the program for the inserts for this season will be about $ 374764.97

4. What other program management opportunities might Maddux pursue?

Answer:

Maddux focuses on purchasing the game economically with a strong focus on quality printing, there are different program that maddux can pursue different programs, 10000 to 30000, 30000 to 60000, withna strong focus on first printing, Maddux. Muddux has high carrying cost because he lacks a good place to store the programs. He can’t put them in the office, or store them down in the maintenance department, where they may get dirty and damaged. So, the compnay needs to focus on reducing the carrying cost so as to have profits. Maddux needs to focus on inserts as well for the programs, so as to increase its revenue and sales.

Most Abortions Are Moral

Most Abortions Are Moral?

Are abortions moral? This question has been stirring up debate between those who favor abortion (liberals / Pro-Choice) and those against it (conservatives / Pro-Life). Liberals believe that the woman should not only be able to choose matters that concern her body, but that a fetus is not a person. The conservatives argue that the fetus is a person from conception. However, when it comes down to legality, the Constitution states that a woman is able to make the choice for herself without government intervention on the basis of the right of privacy.

In Jane English’s article she shows that there are exceptions to every rule concerning why and when abortion is moral or immoral. For example, conservatives say abortion is immoral because it kills potential life but there are justifiable killings. Liberals think since a fetus is not a person it is a justifiable act to kill it. But during the final stages of pregnancy the fetus closely resembles a person.

What if a fetus is a person? Conservatives will consider abortion to be infanticide. If Judith Jarvis Thompson is able to prove that killing is always wrong, she can conclude whether or not abortion is immoral. However, there are justifiable killings. She uses self-defense as an example along with some scenarios. The defense may only equal the threatened injury in severity and should only be the minimum necessary to deter the attacker. Therefore, if the birth of a child poses threat to the mother, abortion may be considered as self-defense. A second scenario says to avoid an attack all together, suggesting to practice abstinence. A third scenario says use protection against the attacker, implying to use birth control. A fourth scenario says you may kill the attacker only if there is certainty he will kill you. Therefore, abortion is “acceptable” if it will save the woman’s life.

What if a fetus is not a person? Since a fetus is considered not to be a full-fledged person, conservatives fear liberals will treat the fetus any way desired hence the debate on abortion. However, when comparing a fetus to an animal, for example, the mistreatment of an animal can result to harsh punishment. Because animals don’t have the same rights as people do, that doesn’t suggest we tolerate the abuse.

When is a fetus actually considered a person? Mary Anne Warner says in order to be labeled a “person” he/she should have the capacities for reasoning, self-awareness, and complex communication skills. Baruch Brody argues brain waves, Paul Ramsey claims a certain gene structure, and Michael Tooley suggests having the concept-of-self distinguishes a fetus from a person. Biological, psychological, rationality, social, and legal factors are also considered to make a distinction between a fetus and a person.

When does a fetus go from a non-person to a person? A fetus’ similarities to a newborn is quite significant during the ending weeks of pregnancy, thus any careless treatment would be immoral. In the early weeks of pregnancy, right after conception, a fetus does not resemble a person enough for abortion to be considered infanticide or immoral.

In conclusion, English says “whether a fetus is a person or not, abortion is justifiable early in pregnancy to avoid modest harms and seldom justifiable late in pregnancy except to avoid significant injury or death” (449 C/D).

Upon reading this article, I was never completely certain about how I felt about abortion. After analyzing English’s views, alongside Thompson, Warner, Brody, Tooley, and Ramsey, I was easily able to come to my own conclusion.

Because I never knew the facts and technicalities of abortion, I was always hesitant to have a distinctive “yes” or “no” answer to whether abortion is immoral. In addition, I was lazy enough to ignore that this was ever even an issue. But somehow I hastily just “decided” that abortion was wrong. Before I read English’s article I read the following statistics that further implemented my decision that abortion is, indeed, immoral:

In Brazil, forty thousand women die each year because of blotched abortions. (449 D)

The United States have three times as many abortions per group as does England, Sweden, or the Netherlands.

Forty-two percent of pregnant women have an abortion in the United States. The average Russian woman has seven abortions during her lifetime. (450 A)

The structure of English’s article was designed well enough for me to focus on the important points of the topic. Agreeing with English that this will forever be an unsettled issue, important details and suggestions were addressed that made the decision that more difficult.

For instance, I never considered the fact that there are justifiable killings. I never even considered the feelings of the lives involved. My sole focus was that not only having a child was a blessing, but the pregnancy was as well. I ignorantly overlooked that all women don’t want to have children, and that the process could potentially be harmful or life threatening to the woman. Therefore, abortion was looking “less immoral.” After reading the self-defense comparisons, however, I was even more confused. If the woman did not want to have a child, she should have used birth control. Practicing abstinence was a good alternative for her as well.

The turning point came when biological factors were addressed. With that, I was finally able to make a decision wisely. Discussed were the stages during pregnancy and the condition of the fetus during each stage. I knew that a fetus least resembled a person during the early weeks of pregnancy apposed to the ending weeks, but that obvious knowledge slipped my mind completely. Once supporting the conservative side without any sensible understanding or reasoning, I can proudly say I have done some research and made a decision. I am neither a liberal nor conservative. Agreeing with English, there are appropriate times and reasons to abort and to not. Abortion is permissible during the early weeks of pregnancy if it is in the best interest of the woman or people around her. During the middle stages of pregnancy, abortion is only permissible when the continuing pregnancy or labor will cause threat to the woman’s well being. During the final stages of pregnancy abortion is immoral unless to save the woman from severe injury or death.

“A newly fertilized ovum, a newly implanted clump of cells, is no more a person than an acorn is an oak tree…opponents of abortion commonly spend most of their time establishing that the fetus is a person, and hardly any time explaining the step from there to the impermissibility of abortion.”Jane English (450 D/E)

Bibliography:

n/a

Adhesive Bonding in the aircraft and automotive industry

Adhesive Bonding in the aircraft and automotive industry

Adhesive bounding of aluminum components in the aircraft and automotive industry are rapidly replacing many conventional methods of joining two parts togheter. Adhesives bonding is a process where a monomer compound is applied in between joints and is chemically allowed to transform into complex long chained polymers which interlock the mating parts by inter-atomic bounding and diffusion of the adhesive into the adherents. In most common uses, bonds are permanent, such as the thermosetting adhesives, and require machining in order to separate the mating parts. In other cases, the adhesive bond might be directly related to the operating temperature, as in thermoplastic adhesives, or may contain natural resins and form an elastic bond such as elastomeric adhesives. Adhesives are mostly limited to shear stress applications due to their relatively low peel and creep capabilities and require far more surface area to form a joint then conventional methods, however, their benefits in weight reduction and enhancing ergonomics, as well as their still fairly inexpensive and ability to function in a wide range of environments, are attractive traits which may influence a designer to select such a process.

Adhesives have been long known as the oldest means of joining two parts togheter. In fact, archeological evidences has been found showing the use of natural resins by early man to fasten arrows and spear heads to shafts (3, 170). They also found there first structural use well over three thousand years ago in the construction of the Tower of Babel ( 9, 3). However, it wasn’t until the second World War where great advances where made in structural adhesive bonding which applied to metal to metal structures. Redux, an adhesive conceived in England, was the first ever adhesive used in considerable proportion on the lightest fighter plane of that time, the Mosquito. Following in it’s allied foot steps, the Americans also adopted this process to produce the most effective aircraft of the war, the De Havilland Hornet which used the adhesive to bond the aluminum extrusions to the capped wing spars (4, 41).

Adhesives have since grown considerably and since no one universal adhesive exists up to date, the boundaries are limitless. They can be found in mostly all types of industries, from high tech aerospace to dishwashing machines, and are more and more, replacing conventional ways of fastening joints, namely mechanical fasteners and welding process.

In most cases, monomers are applied to it’s adherent (part to be jointed) and are turned into polymers, which are long chain type molecules, by means of diverse catalyst ranging from heat, pressure or some other chemical compound all depending on the type of adhesive used.

The reason why the bond takes place between the mating surfaces however has taken different theories over the past years. The three most common, principle of diffusion, principle of mechanical adherence and the principal of inter-atomic bonding have been well more developed than other explanations of why adhesive bonds occur.

The diffusion principle states that at polymerization, some of the molecules diffuse in the adherent and consequently, some molecules of the adherent diffuse into the adhesive in order to form a solid joint. The mechanical principal states that, the imperfections on the wetted surface of the adherent serve as to grip the adhesive when it turns into it’s solid polymer state and takes advantage of these imperfections to establish a solid bond. However, this might not help in explaining why perfectly strong bonds are also possible on highly polished surfaces. The third and most generally accepted theory attributes the bonding forces to the fact of the sharing of valence electrons between the newly formed polymer and the adhered material. Some may like to contribute all three factors working togheter as the proper definition of the bonding process( 3, 170) .

Adhesives may be categorized in three groups, thermosets, thermoplasts or elastomers.

Thermosets such as phenolics, epoxies and ureas are adhesives capable of withstanding high shear stresses and are capable of maintaining their properties for a wide range of temperatures. Once cured, machining or extremely high temperatures are required in order to break the formed bond and are irreversible processes. Contrarily, thermoplasts adhesives such as polyvinyls, acetates or acrylics have bond strength variation which is directly temperature dependent and for which at low temperatures, the bond gets stiff and brittle, but at high temperatures, ductile and elastic bonds occur. The third and last classification are elastomers which are generally made of natural or synthetic rubbers and latexes which are highly ductile and deformable adhesives at temperatures ranging close to room temperature ( 1, 402).

Most adhesives are furthermore classified under its ability to cover the entire surface of the mating parts, termed wetting ability ( 8,5). The Washburn equation is generally applied in order to classify the wetting property of the adhesive and is given by:

t = (2h/gcosq) * x2/rwhere

t : rate of filling irregularities

x : length of irregularity

r : capillary radius

h,g : viscosity and surface tension

q : contact angle between adhesive and substrate

Although the basic application are quite commonly simple, where most adhesives today are still spatula applied, automation is quite common and not such a daunting task to perform. The challenge lies in the preparation of the surfaces to be bonded as well as the study of the optimal curing times and temperatures required to obtain the required bonding strengths.

All parts require extensive cleaning with the use of solvents to eliminate any dust or grease deposit, which may interfere with the bonding process. Metals with oxide films are usually grounded and aluminum alloys pickled in alkali baths at temperatures of 170oF up until 10 minutes in order to clean and roughen the surface for the adhesive. Bare hands should never come into contact with the surfaces to be bonded as they will re-introduce grease to the surfaces to be mated (1, 417). As for curing temperatures and times, each vary depending on the type of adhesive used and the required bond strength sought ( 6, 1054). The most common use of adhesives is in shear bearing applications due to their poor resistance to peel, cleavage and tensile stresses (6, 1056).

This is where the challenges arise for the engineer who must design or modify an existing joint in order to maximize the load in a shear plane direction. Although they are limited to these applications, a well-designed joint may sustain an impressive amount of stress. However, most load bearing structural adhesives may have quoted performances rated as high as 50% of their ultimate tensile strength, but as a general rule of thumb, these materials should never be loaded more than 10% of the rated capabilities, which make designers skeptical in using adhesives for long term use applications ( 7, 5 ).

Another problem arises at selection of the adhesive since no universal adhesive exist, each adhesive has its own characteristics for which it may perform at better operating conditions then others and therefor, a quite profound knowledge of the different types of adhesives available is required. Furthermore, design must require high surface finish and quality control performed very closely. And in most instances, the conversion from a mechanical fastener to an adhesive usually requires a considerable larger surface area of jointing ( 9 ,10-13).

So why use adhesives one might ask? Some adhesives today are now capable to cover temperature ranges from -55oC to 350oC with service life of 60 000 hours or 20 years (4, 42). Furthermore, there are several beneficial reasons why adhesives may be preferred over conventional joining processes. For instance, when comparing to welding, adhesive joints do not distort the part close to the bonding area and does not leave any surface discoloration’s, which in turn may require further grinding and then painting. The most notable advantage is the possibility to join dissimilar metals, which is impossible in welding due to a high variation in melting temperatures.

As for mechanical fasteners, the replacement with adhesives induces a reduction in overall weight and serves as a corrosion barrier between a joint made of two different materials. Since adhesives are also less stiff then most fasteners, they also serve as vibration dampers and can easily accommodate thermal expansion of the adhering joints. By replacing rivets with adhesives in structural components, it is also possible to eliminate the stress concentrations formed near rivet holes and therefor prevent unforeseeable stress cracks, which may lead to disastrous failures. In an ergonomic point of view, adhesives do not protrude from their assemblies and go virtually unnoticeable and offer great characteristics in aerodynamic applications ( 9, 9).

Although the alternative of opting for an adhesive joint might be appealing in some circumstances, the economics involved can be quite complex. In general, adhesives are less expensive than a welding or fastening procedure. However, the implementation of adhesives in a mass production might prove to be quite expensive when taking for account the surface preparation requirements, the curing times and temperatures and the expertise needed to evaluate and control these processes. However, many companies have established major savings by using adhesives instead of other methods. The Northrop Aircraft Company stated that their conventional riveting operation of fabricating trailing wing sections cost them closely to1312$ where as obtaining similar strengths by using adhesives cost them 149$ per wing (3, 171).

In addition, the use of adhesives permitted the use of 0.020in thick aluminum sheets instead of the 0.051in sheets minimum requirements for rivets. Hence savings in money and weight ( 9, 5).

Adhesives most important contribution to the automotive industry came in the early 50’s when it replaced the rivets used to hold the brake linings to the shoe. This allowed for a far greater life of the brakes as they could know be run down all the way down to the show, instead of at the rivet heads. Also, created no distortion in the lining due to riveting, created better heat dissipation and reduced the risk of brake failure.

Although many new applications have arisen, they do not contribute an important saving to the automobile producer. Welds are still very present and so are mechanical fasteners due to the requirements of mass production, which can not permit itself of stopping the production line in order to let the structural adhesives cure. However, most of the final assemblies such as the trimmings, the side panel guards, the window rims and other sealed surfaces are joined by adhesion just prior to painting such that when the automobile must be put in an oven for the paint to cure, the adhesives cure also. Some manufacturers do use adhesives to fix the top gears of the transmission due to their low torque capabilities, namely Renault, and the arrival of vehicles made of composite material panels have created the need for an increase in adhesive joints (5, 63-65)

The reason why adhesive technology has developed so much is surely due to this industry in which adhesives plays a crucial role. A typical Boeing 747 is composed of over 1300m2 of adhesive material. The entire fuselage is covered by an adhesive film, which helps in the aerodynamics and the acoustic dampening of the vehicle. Furthermore, apart from the hundreds of sealed joints where adhesives can be found, critical structures such as wing sections, thrust reversers, walking panels, elevators, doors and flaps to name some, are all composed of high resistance, light weight, good fatigue and high acoustics dampening honeycomb structures which can only be assembled with high strength adhesives (8, 258). Up until date, not one adhesive failure has ever been directly linked to a fallen airplane (9, 5) .Helicopter blades consist of plate-to-plate type adhesive bonds which make for a better, more aerodynamic and certainly safer joint then with rivets, which where know to fracture off (4, 44)

As for space travel, no mission in space would have ever been possible without the use of high strength and temperature ranging adhesives which are required to mount the heat shields on the shuttles under side which protect it from flaming up on re-entry into the atmosphere ( 9, 7).

As the cost of life increasingly becomes more expensive, especially when considering the high fuel prices of today, it is no wonder why manufacturers of transportation vehicles try to optimize their product in order to somehow turn out a profit. Some factors, such as weight and drag reduction, may help in turning in some savings, without compromising the overall safety of the consumer. Adhesives have helped alleviate the problem and this can be seen on such a wide scale that the adhesive industry has grown considerably over the years, an estimated 20% increase in production annually (3, 1). And as more composite materials make their appearance and become economically more feasible, so will the appearance of vehicles which will entirely be made of these plastics and will most certainly contain numerous bonded joints which can only be achieved threw adhesives. These days are certainly not far out of reach.

Bibliography:

1.Dr. Jack W. Chaplin, Metal Manufacturing Technology, 1976, McKnight Publishing Company, Bloomington, Illinois, TS 205 C45, Concordia University Librairy.

2.Lawrence E. Doyle, Manufacturing Processes and Materials for Engineers, 3rd edition, 1985, Prentice-Hall Inc., Englwood Cliff, New Jersey, TS205 D64, Concordia University Librairy.

3.Roy A. Lindberg, Norman R. Braton, Welding and Other Joining Processes, 1976, Allyn and Byron Inc., Boston, TS 227 L58, Concordia University Librairy.

4.J. Hamer, Engineering Applications of Adhesives, 1988, Butterworths, London,UK, TP 968 E53, Concordia University Librairy.

5.E. Lawley, Engineering Applications of Adhesives, 1988, Butterworths, London,UK, TP 968 E53, Concordia University Librairy.

6.E. Paul De Garno, J.T. Black, Ronald A. Koltser, Materials and Processes in Manufacturing, 4th edition, 1997, Prentice-Hall Inc., Upper Saddle River NJ.

7.W.A. Lees, Adhesives in Engineering Design, 1984, Springer-Verlag, London,

TA 455 A 34L 44, Concordia University Librairy.

8.D.M. Brewis, D. Briggs, Industrial Adhesion Problems, 1985, Orbital Press, Oxford,

TP 968 I52, Concordia University Librairy.

9.Charles V. Cagle, Adhesive Bonding Techniques and Applications, 1968, McGraw-

Hill Book Company, South El Monte, California, TP 968 C3, Concordia University Librairy.

10. http://www.loctite.com/literature/design_metal.html” The Loctite Design Guide for Bonding Metals, Loctite Corporation, 2001.